skip to main content
10.1145/3538969.3543783acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud

Published:23 August 2022Publication History

ABSTRACT

Intelligent sensing solutions bridge the gap between the physical world and the cyber-physical systems by digitizing the sensor data collected from sensor devices. Sensor cloud networks provide physical and virtual sensing device resources and enable uninterrupted intelligent solutions to end-users. Thanks to advancements in machine learning algorithms and big data, the automation of mundane tasks with artificial intelligence is becoming a reliable smart option. However, existing approaches based on centralized Machine Learning (ML) on sensor cloud networks fail to ensure data privacy. Moreover, centralized ML works with the pre-requisite to transfer the entire training dataset from end devices to a central server. To address this, we propose a Quantized Federated Learning (FL) based approach, called CloudFL, to ensure data privacy on end devices in a sensor cloud network. Our framework enables a personalized version of FL implementation and enhances privacy and security with cryptosystem tools to obfuscate the information of the FL process from unauthorized access. Furthermore, microservices of our approach provide software as a service implementation of FL with instances of cloud servers that require zero-touch on local data for training.

References

  1. Mohammed Aledhari, Rehma Razzak, Reza M. Parizi, and Fahad Saeed. 2020. Federated Learning: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Access 8(2020), 140699–140725.Google ScholarGoogle ScholarCross RefCross Ref
  2. Iman Almomani, Bassam Kasasbeh, and Mousa AL-Akhras. 2016. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks. Journal of Sensors 2016 (01 2016), 1–16. https://doi.org/10.1155/2016/4731953Google ScholarGoogle Scholar
  3. Zubair A Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, 2017. Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation 22(2017), 3–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lorenzo Bassi. 2017. Industry 4.0: Hope, hype or revolution?. In 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  5. Yukun Ding, Jinglan Liu, Jinjun Xiong, and Yiyu Shi. 2019. On the Universal Approximability and Complexity Bounds of Quantized ReLU Neural Networks. In International Conference on Learning Representations.Google ScholarGoogle Scholar
  6. Rajendra Kumar Dwivedi, Munish Saran, and Rakesh Kumar. 2019. A Survey on Security over Sensor-Cloud. In 2019 9th International Conference on Cloud Computing, Data Science Engineering (Confluence). 31–37. https://doi.org/10.1109/CONFLUENCE.2019.8776897Google ScholarGoogle ScholarCross RefCross Ref
  7. Yujia Gao, Liang Liu, Xiaolong Zheng, Chi Zhang, and Huadong Ma. 2021. Federated Sensing: Edge-Cloud Elastic Collaborative Learning for Intelligent Sensing. IEEE Internet of Things Journal(2021), 1–1. https://doi.org/10.1109/JIOT.2021.3053055Google ScholarGoogle Scholar
  8. Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol. 9), Yee Whye Teh and Mike Titterington (Eds.). PMLR, Chia Laguna Resort, Sardinia, Italy, 249–256.Google ScholarGoogle Scholar
  9. Zawar Hussain, Quan Sheng, Wei Emma Zhang, Jorge Ortiz, and Seyedamin Pouriyeh. 2021. A Review of the Non-Invasive Techniques for Monitoring Different Aspects of Sleep.Google ScholarGoogle Scholar
  10. Ahmed Imteaj and M. Hadi Amini. 2019. Distributed Sensing Using Smart End-User Devices: Pathway to Federated Learning for Autonomous IoT. In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). 1156–1161. https://doi.org/10.1109/CSCI49370.2019.00218Google ScholarGoogle ScholarCross RefCross Ref
  11. Ji Chu Jiang, Burak Kantarci, Sema Oktug, and Tolga Soyata. 2020. Federated Learning in Smart City Sensing: Challenges and Opportunities. Sensors 20, 21 (2020).Google ScholarGoogle Scholar
  12. S. Madria, V. Kumar, and R. Dalvi. 2014. Sensor Cloud: A Cloud of Virtual Sensors. IEEE Software 31, 2 (2014), 70–77. https://doi.org/10.1109/MS.2013.141Google ScholarGoogle ScholarCross RefCross Ref
  13. Afra Mashhadi, Joshua Sterner, and Jeffrey Murray. 2021. Deep Embedded Clustering of Urban Communities Using Federated Learning. In 2021 International Joint Conference on Neural Networks (IJCNN). 1–8. https://doi.org/10.1109/IJCNN52387.2021.9534268Google ScholarGoogle Scholar
  14. H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Agüera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. arxiv:1602.05629 [cs.LG]Google ScholarGoogle Scholar
  15. Viraaji Mothukuri, Prachi Khare, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Gautam Srivastava. 2022. Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet of Things Journal 9, 4 (2022), 2545–2554.Google ScholarGoogle ScholarCross RefCross Ref
  16. Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, and Gautam Srivastava. 2021. A survey on security and privacy of federated learning. Future Generation Computer Systems 115 (2021), 619–640.Google ScholarGoogle ScholarCross RefCross Ref
  17. Davy Preuveneers, Vera Rimmer, Ilias Tsingenopoulos, Jan Spooren, Wouter Joosen, and Elisabeth Ilie-Zudor. 2018. Chained anomaly detection models for federated learning: An intrusion detection case study. Applied Sciences 8, 12 (2018), 2663.Google ScholarGoogle ScholarCross RefCross Ref
  18. Md. Mamunur Rahman, Md. Rashfit Ahmed Rahi, and Md. Abdur Razzaque. 2020. Federated Learning for Accurate Detection of Speed Breakers on The Road. In 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). 1–6. https://doi.org/10.1109/STI50764.2020.9350433Google ScholarGoogle Scholar
  19. Christopher Regan, Mohammad Nasajpour, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2022. Federated IoT attack detection using decentralized edge data. Machine Learning with Applications 8 (2022), 100263.Google ScholarGoogle ScholarCross RefCross Ref
  20. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017(2018).Google ScholarGoogle Scholar
  21. Deniz Sadighbayan and Ebrahim Ghafar-Zadeh. 2021. Portable sensing devices for detection of COVID-19: A review. IEEE Sensors Journal(2021).Google ScholarGoogle ScholarCross RefCross Ref
  22. Wenchao Xia, Wanli Wen, Kai-Kit Wong, Tony Q.S. Quek, Jun Zhang, and Hongbo Zhu. 2021. Federated-Learning-Based Client Scheduling for Low-Latency Wireless Communications. IEEE Wireless Communications 28, 2 (2021), 32–38. https://doi.org/10.1109/MWC.001.2000252Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
          August 2022
          1371 pages
          ISBN:9781450396707
          DOI:10.1145/3538969

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 August 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate228of451submissions,51%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format